Andariel, affiliated with North Korea's Lazarus Group, strikes with EarlyRat #malware exploiting Log4j vulnerability.
Learn how they compromise systems: https://thehackernews.com/2023/06/north-korean-hacker-group-andariel.html
Learn how they compromise systems: https://thehackernews.com/2023/06/north-korean-hacker-group-andariel.html
β‘15π€―6π4π€4
β οΈ Attention Android users!
Fluhorse has evolved and become more sophisticated. It conceals its encrypted payload and listens to your SMS messages.
Read details: https://thehackernews.com/2023/06/fluhorse-flutter-based-android-malware.html
Fluhorse has evolved and become more sophisticated. It conceals its encrypted payload and listens to your SMS messages.
Read details: https://thehackernews.com/2023/06/fluhorse-flutter-based-android-malware.html
π21π±8π₯7π€―4π€3
Iranian state-sponsored group, MuddyWater, deploys new PhonyC2 framework in targeted cyber attacks. New findings reveal connections to Technion breach and ongoing PaperCut server exploitation.
Details: https://thehackernews.com/2023/06/from-muddyc3-to-phonyc2-irans.html
Details: https://thehackernews.com/2023/06/from-muddyc3-to-phonyc2-irans.html
π21π€―13π7π₯6π€6π±4β‘3π1
β‘ Attention all software developers and programmers! MITRE's Top 25 list of dangerous software weaknesses for 2023 is here.
Discover the crucial mistakes to avoid early in your product development process:
https://thehackernews.com/2023/06/mitre-unveils-top-25-most-dangerous.html
Build secure software from the ground up!
Discover the crucial mistakes to avoid early in your product development process:
https://thehackernews.com/2023/06/mitre-unveils-top-25-most-dangerous.html
Build secure software from the ground up!
π₯23β‘9π6π€―6π€4
Beware of proxyjacking! Vulnerable SSH servers are under attack in a financially motivated campaign, covertly ensnaring them into a proxy network.
Read details: https://thehackernews.com/2023/06/cybercriminals-hijacking-vulnerable-ssh.html
Discover how threat actors exploit unused bandwidth to run services and monetize it.
Read details: https://thehackernews.com/2023/06/cybercriminals-hijacking-vulnerable-ssh.html
Discover how threat actors exploit unused bandwidth to run services and monetize it.
π₯18π7π±4π€1
πͺ WhatsApp rolls out an upgrade to its proxy feature! Share more than just texts - a step towards countering internet π« censorship.
Learn more: https://thehackernews.com/2023/06/whatsapp-upgrades-proxy-feature-against.html
Learn more: https://thehackernews.com/2023/06/whatsapp-upgrades-proxy-feature-against.html
π₯49π30π19π€9π±9π6β‘2
North Korea's BlueNoroff, part of Lazarus Group, has upgraded their macOS #malware, Rustbucket, to avoid detection and persist longer.
Find out more hereπ https://thehackernews.com/2023/07/beware-new-rustbucket-malware-variant.html
Find out more hereπ https://thehackernews.com/2023/07/beware-new-rustbucket-malware-variant.html
π±23π20π12π₯2π€1
BlackCat ransomware now spreading via malvertising! Watch out for rogue installers disguised as legitimate apps like WinSCP.
Learn more: https://thehackernews.com/2023/07/blackcat-operators-distributing.html
Learn more: https://thehackernews.com/2023/07/blackcat-operators-distributing.html
π±26π16π₯6π€―3β‘2π2π€1
Your crypto wallet, your secrets, even your games β NOTHING is safe from Meduza Stealer.
Discover how this crimeware stays ahead of the game. https://thehackernews.com/2023/07/evasive-meduza-stealer-targets-19.html
Discover how this crimeware stays ahead of the game. https://thehackernews.com/2023/07/evasive-meduza-stealer-targets-19.html
π±19π10π€9π₯5β‘4π4π€―3
π£ ALERT: CISA flags 8 severe vulnerabilities currently exploited in the wild - 6 affecting Samsung phones and 2 in D-Link devices.
Full info here π https://thehackernews.com/2023/07/cisa-flags-8-actively-exploited-flaws.html
Full info here π https://thehackernews.com/2023/07/cisa-flags-8-actively-exploited-flaws.html
π€―21π14β‘3π₯3π3π±3
π¨ Critical Alert! Over 330,000 FortiGate firewalls are still vulnerable to the critical CVE-2023-27997 RCE exploit!
Don't be a sitting duck, PATCH NOW!
Learn more: https://thehackernews.com/2023/07/alert-330000-fortigate-firewalls-still.html
Don't be a sitting duck, PATCH NOW!
Learn more: https://thehackernews.com/2023/07/alert-330000-fortigate-firewalls-still.html
π₯23π€―9π±8β‘4π€4π1
Neo_Net, a Mexican e-crime actor, is behind an Android malware campaign that's stolen β¬350,000+ and compromised PII data.
Read details: https://thehackernews.com/2023/07/mexico-based-hacker-targets-global.html
Don't be fooled by the faΓ§ade - ensure your banking app is legit!
Read details: https://thehackernews.com/2023/07/mexico-based-hacker-targets-global.html
Don't be fooled by the faΓ§ade - ensure your banking app is legit!
β‘9π7π€―7π₯4π3
DDoSia attack tool gets an upgrade! Now conceals target lists with new encryption methods.
Learn more: https://thehackernews.com/2023/07/ddosia-attack-tool-evolves-with.html
Learn more: https://thehackernews.com/2023/07/ddosia-attack-tool-evolves-with.html
π€―12π₯9π6β‘3π±2
π Attention companies: the Swedish watchdog warns against using Google Analytics over Data Protection risks linked to U.S. surveillance.
Learn the full story here: https://thehackernews.com/2023/07/swedish-data-protection-authority-warns.html
Learn the full story here: https://thehackernews.com/2023/07/swedish-data-protection-authority-warns.html
π25π15β‘6π2π₯1
Meta's Instagram Threads, poised as the next Twitter rival, hits a roadblock in Europe over privacy concerns.
Why? The app's extensive user data collection may not comply with EU's strict privacy standards.
Learn more: https://thehackernews.com/2023/07/instagrams-twitter-alternative-threads.html
Why? The app's extensive user data collection may not comply with EU's strict privacy standards.
Learn more: https://thehackernews.com/2023/07/instagrams-twitter-alternative-threads.html
π37π11π9π₯8π€2β‘1
π₯Developers, beware! npm packages are vulnerable to "manifest confusion."
This could serve as a backdoor for malicious code, hiding in your project dependencies, potentially triggering a dreaded supply chain attack.
Learn more: https://thehackernews.com/2023/07/nodejs-users-beware-manifest-confusion.html
This could serve as a backdoor for malicious code, hiding in your project dependencies, potentially triggering a dreaded supply chain attack.
Learn more: https://thehackernews.com/2023/07/nodejs-users-beware-manifest-confusion.html
π₯19π10β‘3π1
β‘ Discover the power of automated IoT security testing with BugProve firmware analysis tool.
β Detects zero-day vulnerabilities
β Monitors emerging threats
β Compliance support
β Remediation recommendations
Try it for FREE https://thn.news/firmware-analysis-tool
Get 50% OFF - Limited time offer: https://thn.news/BugProve
β Detects zero-day vulnerabilities
β Monitors emerging threats
β Compliance support
β Remediation recommendations
Try it for FREE https://thn.news/firmware-analysis-tool
Get 50% OFF - Limited time offer: https://thn.news/BugProve
π24π±11π€5π₯3π€―3
RedEnergy, a sophisticated stealer-as-a-ransomware threat, is targeting energy utilities, oil, gas, telecom, and machinery sectors, using LinkedIn pages to deceive and compromise valuable information.
Learn more about this cyberattack: https://thehackernews.com/2023/07/redenergy-stealer-as-ransomware-threat.html
Learn more about this cyberattack: https://thehackernews.com/2023/07/redenergy-stealer-as-ransomware-threat.html
π25π₯7π€―3β‘2
Suspected leader of OPERA1ER hacking crew, responsible for $11 Million+ in theft, has been arrested in an international operation.
Learn more here: https://thehackernews.com/2023/07/interpol-nabs-hacking-crew-opera1ers.html
Learn more here: https://thehackernews.com/2023/07/interpol-nabs-hacking-crew-opera1ers.html
π23π3π€3π±3
A potentially massive cyberattack campaign is targeting cloud-native environments. Researchers unearthed an aggressive worm exploiting JupyterLab and Docker APIs. It deploys Tsunami malware and hijacks resources.
Read: https://thehackernews.com/2023/07/silentbob-campaign-cloud-native.html
Read: https://thehackernews.com/2023/07/silentbob-campaign-cloud-native.html
π23π€―6β‘1
Is your organization eligible for cyber insurance?
Discover the crucial role of regular penetration testing in assessing your cybersecurity risk profile.
Learn more: https://thehackernews.com/2023/07/how-pen-testing-can-soften-blow-on.html
Discover the crucial role of regular penetration testing in assessing your cybersecurity risk profile.
Learn more: https://thehackernews.com/2023/07/how-pen-testing-can-soften-blow-on.html
π13π₯12π€2π1